BREAKING: We’ve confirmed that the Ring doorbell app on Android covertly shares personally identifiable information on its users with third-party companies, including Facebook.
https://www.eff.org/deeplinks/2020/01/ring-doorbell-app-packed-third-party-trackers
@nextcloud strange to encourage use of a centralised proprietary service on Mastodon. Was this a cross-post from somewhere?
@dietrich is there source for the firmware? Can users interrupt or redirect the OTA updates?
If either of those are not true, then the device is interesting but not something to recommend
The tools are maturing... enabling products built entirely on privacy-oriented decentralized platforms.
Iotex is a user-first home camera alternative to Nest, Ring, Wyze.
Built with decentralized identity and IPFS.
Thx @jennwrites@twitter.com for spotting!
These are baseless accusations of "cybercrimes."
The charges are “an obvious attempt to attack a free press in retaliation for the revelations we reported about Minister Moro and the Bolsonaro government.” - Glenn Greenwald
https://nytimes.com/2020/01/21/world/americas/glenn-greenwald-brazil-cybercrimes.html
.onion: https://nytimes3xbfgragh.onion/2020/01/21/world/americas/glenn-greenwald-brazil-cybercrimes.html
@gael please address https://community.e.foundation/t/how-is-the-e-nextcloud-encrypted/8388 so that /e/ is actually better than Apple and Google in this regard
I've seen the benefit of the Feed-In-Tariff, and am saddened that locally it has been stopped by the latest provincial government.
At least Germany is still leading the world with this.
Planet Money: #965: Das Green Old Deal https://www.npr.org/2020/01/17/797322305/episode-965-das-green-old-deal
@kyle mastercard sells realtime transaction data: https://www.mastercardservices.com/en/data-analytics
There was some way to opt out per card, but you need to look that up.
The Indicator from Planet Money: How Amazon's Counterfeit Products Threaten Safety https://www.npr.org/2020/01/14/796296810/how-amazons-counterfeit-products-threaten-safety
@sir working in asm, the JMP was tightly controlled; each section of code had well defined input, output, & modified register lists. Without that, the it was nearly impossible to comprehend.
Later, I came across code (professionally) where there was an inspired genius who liberally used the GOTO. No one could touch it without breaking. This is the more common usage.
Engineered GOTO is fine. Most developers are hacks and cut people with these sharp knives.
@sir it doesn't help that writing a custom allocator is one of the earliest exercises in the white bible.
Strangely it went along the lines of "here's variables, here's printf, here's pointers. Now write an allocator/deallocator"
Tor Browser 9.0.4 is out now.
This release fixes a critical security issue in Firefox: CVE-2019-17026. https://blog.torproject.org/new-release-tor-browser-904
Enlightening look at the power of location data that almost everyone's phone is giving up constantly. Claims of anonymity debunked in chilling way:
https://www.nytimes.com/interactive/2019/12/19/opinion/location-tracking-cell-phone.html
"Yet Another #Librem5 and #PinePhone Comparison" is an in-depth technical comparison of the two devices by #postmarketOS developer @martijnbraam
You can read it here: https://tuxphones.com/yet-another-librem-5-and-pinephone-linux-smartphone-comparison/ #linux